Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)
DOI: 10.1109/reldis.1998.740475
|View full text |Cite
|
Sign up to set email alerts
|

A VP-accordant checkpointing protocol preventing useless checkpoints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0
5

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(36 citation statements)
references
References 14 publications
1
30
0
5
Order By: Relevance
“…Coordinated checkpointing protocols coordinate the processes at checkpoint time to ensure that the saved global state is consistent [11]. Communication-induced checkpointing provides the same guarantee without synchronizing the processes explicitly: they piggyback information on application messages instead [4]. Finally, uncoordinated checkpointing protocols take process checkpoints independently [5].…”
Section: B Modeling Applications Determinismmentioning
confidence: 99%
“…Coordinated checkpointing protocols coordinate the processes at checkpoint time to ensure that the saved global state is consistent [11]. Communication-induced checkpointing provides the same guarantee without synchronizing the processes explicitly: they piggyback information on application messages instead [4]. Finally, uncoordinated checkpointing protocols take process checkpoints independently [5].…”
Section: B Modeling Applications Determinismmentioning
confidence: 99%
“…Because ckpt_index(I q,last ) = CI max , q rolls back to the last checkpoint, C q,7 . Because there is no checkpoint interval I such that I r,3 depends on I and the checkpoint at the end of I is not taken, process r can roll back to C r, 8 . Likewise, process p and s roll back to their last check-…”
Section: Rulementioning
confidence: 99%
“…Asynchronous checkpointing [3,4] and quasi-synchronous checkpointing [5][6][7][8][9][10][11][12] protocols allow processes to take checkpoints at different frequencies. Because asynchronous checkpointing protocols do not ensure the advance of consistent global checkpoint, the protocols are susceptible to the domino effect [13].…”
Section: Introductionmentioning
confidence: 99%
“…However, log-based protocols are predominantly used in databases [28] and file systems [34] because they have access to a large and persistent disk storage. CRR is checkpointbased, and there is an extensive set of algorithms and implementations of distributed checkpoint schemes in a variety of domains ranging from loosely coupled message passing systems to tightly coupled multiprocessors [5,6,10,19,22,30,32,36,38]. A taxonomy and survey of such schemes is given in [20].…”
Section: Related Workmentioning
confidence: 99%